João Barros

Orcid: 0000-0003-0465-1751

According to our database1, João Barros authored at least 145 papers between 2002 and 2021.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2023, "For contributions to physical-layer security and vehicular networking".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Deep speed estimation from synthetic and monocular data.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021

2018
Anonymity Leakage in Private VoIP Networks.
IEEE Trans. Dependable Secur. Comput., 2018

PortoLivingLab: An IoT-Based Sensing Platform for Smart Cities.
IEEE Internet Things J., 2018

Throughput and Economics of DSRC-Based Internet of Vehicles.
IEEE Access, 2018

2017
Neighbor-Aided Localization in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2017

Is It Cost-Effective to Share Roadside Infrastructure for Internet Access?
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Towards Future Mobility with Mesh Connected Vehicles.
Proceedings of the 3rd International Conference on Vehicle Technology and Intelligent Transport Systems, 2017

2016
Throughput and Cost-Effectiveness of Vehicular Mesh Networks for Internet Access.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

LASP: Look-ahead spatial protocol for vehicular multi-hop communication.
Proceedings of the 2016 IEEE Vehicular Networking Conference, 2016

2015
Hardware Abstraction and Protocol Optimization for Coded Sensor Networks.
IEEE/ACM Trans. Netw., 2015

A Mobile Sensing Approach to Stress Detection and Memory Activation for Public Bus Drivers.
IEEE Trans. Intell. Transp. Syst., 2015

Guest Editorial: Fundamental Approaches to Network Coding in Wireless Communication Systems.
IEEE J. Sel. Areas Commun., 2015

On Optimal Policies for Network-Coded Cooperation: Theory and Implementation.
IEEE J. Sel. Areas Commun., 2015

Network Coding Protocols for Data Gathering Applications.
IEEE Commun. Lett., 2015

Experimental Characterization of I2V Wi-Fi Connections in an Urban Testbed.
Proceedings of the 10th ACM MobiCom Workshop on Challenged Networks, 2015

Demo: Platform for Collecting Data From Urban Sensors Using Vehicular Networking.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

Optimal strategies for side-channel leakage in FCFS packet schedulers.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Impact of Position Errors on Path Loss Model Estimation for Device-to-Device Channels.
IEEE Trans. Wirel. Commun., 2014

Geometry-Based Vehicle-to-Vehicle Channel Modeling for Large-Scale Simulation.
IEEE Trans. Veh. Technol., 2014

Network Coding Protocols for Smart Grid Communications.
IEEE Trans. Smart Grid, 2014

TVR - Tall Vehicle Relayingin Vehicular Networks.
IEEE Trans. Mob. Comput., 2014

Network-Coded Cooperation Over Time-Varying Channels.
IEEE Trans. Commun., 2014

Modeling Network Coded TCP: Analysis of Throughput and Energy Cost.
Mob. Networks Appl., 2014

Real-Time Network Coding for Live Streaming in Hyper-Dense WiFi Spaces.
IEEE J. Sel. Areas Commun., 2014

SenseMyCity: Crowdsourcing an Urban Sensor.
CoRR, 2014

Harbornet: a real-world testbed for vehicular networks.
IEEE Commun. Mag., 2014

How to build vehicular networks in the real world.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Network coding for wireless cooperative networks: Simple rules, near-optimal delay.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security.
IEEE Signal Process. Mag., 2013

Collision-free jamming for enhanced wireless secrecy.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

Spherical codes for the Gaussian wiretap channel with continuous input alphabets.
Proceedings of the 14th IEEE Workshop on Signal Processing Advances in Wireless Communications, 2013

Contextual Query Using Bell Tests.
Proceedings of the Quantum Interaction - 7th International Conference, 2013

Minimizing the completion time of a wireless cooperative network using network coding.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Trade-Off between Cost and Goodput in Wireless: Replacing Transmitters with Coding.
Proceedings of the Mobile Networks and Management - 5th International Conference, 2013

Melting Pad: An Efficiently Decodable Coding Scheme for Information Theoretic Confidentiality.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Understanding Sequential Decisions via Inverse Reinforcement Learning.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Designing scalar quantizers with secrecy constraints.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Random puncturing for secrecy.
Proceedings of the 2013 Asilomar Conference on Signals, 2013

2012
Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion.
IEEE Trans. Inf. Forensics Secur., 2012

Secure Communication in Stochastic Wireless Networks - Part I: Connectivity.
IEEE Trans. Inf. Forensics Secur., 2012

Coding for Trusted Storage in Untrusted Networks.
IEEE Trans. Inf. Forensics Secur., 2012

Topology matters in network coding.
Telecommun. Syst., 2012

Security and privacy issues for the network of the future.
Secur. Commun. Networks, 2012

Seeing is Believing - Enhancing Message Dissemination in Vehicular Networks Through Visual Cues.
IEEE Commun. Lett., 2012

TVR - Tall Vehicle Relaying in Vehicular Networks
CoRR, 2012

Trade-off between cost and goodput in wireless
CoRR, 2012

Probabilistic flooding in stochastic networks: Analysis of global information outreach.
Comput. Networks, 2012

DAZL: Density-Aware Zone-based packet forwarding in vehicular networks.
Proceedings of the 2012 IEEE Vehicular Networking Conference, 2012

A total energy approach to protocol design in coded wireless sensor networks.
Proceedings of the International Symposium on Network Coding, 2012

Improved joint turbo decoding and physical-layer network coding.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Hide and code: Session anonymity in wireless line networks with coded packets.
Proceedings of the 2012 Information Theory and Applications Workshop, 2012

A cooperative protocol for jamming eavesdroppers in wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

Physical-layer security over correlated erasure channels.
Proceedings of IEEE International Conference on Communications, 2012

Probabilistic key distribution in vehicular networks with infrastructure support.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Lists that are smaller than their parts: A coding approach to tunable secrecy.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Position-Based Jamming for Enhanced Wireless Secrecy.
IEEE Trans. Inf. Forensics Secur., 2011

Wireless Secrecy Regions With Friendly Jamming.
IEEE Trans. Inf. Forensics Secur., 2011

Guest Editorial Special Issue on Using the Physical Layer for Securing the Next Generation of Communication Systems.
IEEE Trans. Inf. Forensics Secur., 2011

LDPC Codes for the Gaussian Wiretap Channel.
IEEE Trans. Inf. Forensics Secur., 2011

Coding for Cryptographic Security Enhancement Using Stopping Sets.
IEEE Trans. Inf. Forensics Secur., 2011

Network Coding Meets TCP: Theory and Implementation.
Proc. IEEE, 2011

On the Delay Distribution of Random Linear Network Coding.
IEEE J. Sel. Areas Commun., 2011

Algebraic Watchdog: Mitigating Misbehavior in Wireless Network Coding.
IEEE J. Sel. Areas Commun., 2011

Impact of Vehicles as Obstacles in Vehicular Ad Hoc Networks.
IEEE J. Sel. Areas Commun., 2011

Physical-Layer Security over Correlated Erasure Channels
CoRR, 2011

Exploiting the height of vehicles in vehicular communication.
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011

Modeling network coded TCP throughput: a simple model and its validation.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011

Network coding in Smart Grids.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

A mobile sensing architecture for massive urban scanning.
Proceedings of the 14th International IEEE Conference on Intelligent Transportation Systems, 2011

GeoCode: A geographic coding-aware communication protocol.
Proceedings of the 14th International IEEE Conference on Intelligent Transportation Systems, 2011

Wireless secrecy in large-scale networks.
Proceedings of the Information Theory and Applications Workshop, 2011

Joint source-network coding for large-scale sensor networks.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Physical-Layer Security: From Information Theory to Security Engineering.
Cambridge University Press, ISBN: 9780511977985, 2011

2010
Secure network coding for multi-resolution wireless video streaming.
IEEE J. Sel. Areas Commun., 2010

On counteracting Byzantine attacks in network coded peer-to-peer networks.
IEEE J. Sel. Areas Commun., 2010

Secure Communication in Stochastic Wireless Networks
CoRR, 2010

Experimental study on the impact of vehicular obstructions in VANETs.
Proceedings of the Second IEEE Vehicular Networking Conference, 2010

A multi-hop multi-source Algebraic Watchdog.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

Stopping sets for physical-layer security.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

A non-intrusive multi-sensor system for characterizing driver behavior.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

Network coding delay: A brute-force analysis.
Proceedings of the Information Theory and Applications Workshop, 2010

One-shot capacity of discrete channels.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Practical Network Coding with Resilient Subspace Codes.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Friendly Jamming for Wireless Secrecy.
Proceedings of IEEE International Conference on Communications, 2010

Techniques for Enhanced Physical-Layer Security.
Proceedings of the Global Communications Conference, 2010

Trusted Storage over Untrusted Networks.
Proceedings of the Global Communications Conference, 2010

2009
Low-complexity coding and source-optimized clustering for large-scale sensor networks.
ACM Trans. Sens. Networks, 2009

Unicast communication in vehicular ad hoc networks: a reality check.
IEEE Commun. Lett., 2009

Towards the Safe Programming of Wireless Sensor Networks
Proceedings of the Proceedings Second International Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, 2009

Interfacing network coding with TCP: an implementation
CoRR, 2009

Vehicular Connectivity Models: From Single-Hop Links to Large-Scale Behavior.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

A Cautionary View of Mobility and Connectivity Modeling in Vehicular Ad-Hoc Networks.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

NECO: NEtwork COding simulator.
Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, 2009

Network Coding Multicast in Satellite Networks.
Proceedings of the Next Generation Internet Networks, 2009

Towards secure multiresolution network coding.
Proceedings of the 2009 IEEE Information Theory Workshop, 2009

Practical source-network decoding.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009

Wireless physical-layer security: The case of colluding eavesdroppers.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Byzantine attacks against network coding in peer to peer distributed storage.
Proceedings of the IEEE International Symposium on Information Theory, 2009

An algebraic watchdog for wireless network coding.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Network Coding Meets TCP.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Effective Delay Control in Online Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Analysis of Probabilistic Flooding: How Do We Choose the Right Coin?
Proceedings of IEEE International Conference on Communications, 2009

LDPC for Physical Layer Security.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Low-complexity index assignments for secure quantization.
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009

Joint compression and data protection.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

Programming Wireless Sensor Networks.
Proceedings of the Middleware for Network Eccentric and Mobile Applications, 2009

2008
The Commitment Capacity of the Gaussian Channel Is Infinite.
IEEE Trans. Inf. Theory, 2008

Wireless Information-Theoretic Security.
IEEE Trans. Inf. Theory, 2008

A Network Coding Approach to Secret Key Distribution.
IEEE Trans. Inf. Forensics Secur., 2008

A Max-Flow Min-Cut Theorem with Applications in Small Worlds and Dual Radio Networks
CoRR, 2008

Network Coding Security: Attacks and Countermeasures
CoRR, 2008

Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
CoRR, 2008

Large-scale simulation of V2V environments.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Informed network coding for minimum decoding delay.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Physical-layer encryption with stream ciphers.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

Strong Secrecy for Wireless Channels (Invited Talk).
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Lightweight Security for Network Coding.
Proceedings of IEEE International Conference on Communications, 2008

On the Urban Connectivity of Vehicular Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2008

2007
Estimation of functionals over noisy channels.
Eur. Trans. Telecommun., 2007

A Formal Model for Programming Wireless Sensor Networks
CoRR, 2007

Random Walks on Sensor Networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Dual Radio Networks: Capacity and Connectivity.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

A feedback reputation mechanism to secure the optimized link state routing protocol.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Mobile Secret Key Distribution with Network Coding.
Proceedings of the SECRYPT 2007, 2007

Network Coding Protocols for Secret Key Distribution.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Random Linear Network Coding: A free cipher?
Proceedings of the IEEE International Symposium on Information Theory, 2007

Estimating a Function from Noisy Sensor Data: A Factor Graph Approach.
Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007

Codes for Sensors: An Algorithmic Perspective.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007

2006
Network information flow with correlated sources.
IEEE Trans. Inf. Theory, 2006

Scalable decoding on factor trees: a practical solution for wireless sensor networks.
IEEE Trans. Commun., 2006

Network Information Flow in Small World Networks
CoRR, 2006

A Calculus for Sensor Networks
CoRR, 2006

Wireless Information-Theoretic Security - Part II: Practical Implementation
CoRR, 2006

Wireless Information-Theoretic Security - Part I: Theoretical Aspects
CoRR, 2006

On the Capacity of Small-World Networks.
Proceedings of the 2006 IEEE Information Theory Workshop, 2006

Secrecy Capacity of Wireless Channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Bit Commitment over Gaussian Channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Source-Optimized Clustering for Distributed Source Coding.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A coding theorem for network information flow with correlated sources.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Reachback communication in wireless sensor networks.
PhD thesis, 2004

Scalable source/channel decoding for large-scale sensor networks.
Proceedings of IEEE International Conference on Communications, 2004

2003
Coding Theorems for the Sensor Reachback Problem with Partially Cooperating Nodes.
Proceedings of the Advances in Network Information Theory, 2003

2002
Wireless transmission of packet audio using multiple descriptions.
Proceedings of the 13th IEEE International Symposium on Personal, 2002

Sequencing Multiple Descriptions.
Proceedings of the 2002 Data Compression Conference (DCC 2002), 2002

On the capacity of the reachback channel in wireless sensor networks.
Proceedings of the IEEE 5th Workshop on Multimedia Signal Processing, 2002


  Loading...